Sciweavers

546 search results - page 78 / 110
» An Implementation Scheme of Relational Tables
Sort
View
CCS
2003
ACM
14 years 23 days ago
On the performance, feasibility, and use of forward-secure signatures
Forward-secure signatures (FSSs) have recently received much attention from the cryptographic theory community as a potentially realistic way to mitigate many of the difficulties...
Eric Cronin, Sugih Jamin, Tal Malkin, Patrick Drew...
CRYPTO
2008
Springer
186views Cryptology» more  CRYPTO 2008»
13 years 9 months ago
Communication Complexity in Algebraic Two-Party Protocols
In cryptography, there has been tremendous success in building various two-party protocols with small communication complexity out of homomorphic semantically-secure encryption sc...
Rafail Ostrovsky, William E. Skeith III
SSDBM
2007
IEEE
107views Database» more  SSDBM 2007»
14 years 1 months ago
Efficient Evaluation of Inbreeding Queries on Pedigree Data
We consider pedigree data structured in the form of a directed acyclic graph, and use an encoding scheme, called NodeCodes, for expediting the evaluation of queries on pedigree gr...
Brendan Elliott, Suleyman Fatih Akgul, Stephen May...
CIA
2007
Springer
14 years 1 months ago
A Generic Framework for Argumentation-Based Negotiation
Past years have witnessed a growing interest in automated negotiation as a coordination mechanism for interacting agents. This paper presents a generic, problem- and domain-indepen...
Markus M. Geipel, Gerhard Weiss
CRV
2005
IEEE
104views Robotics» more  CRV 2005»
14 years 1 months ago
A Hierarchical Non-Parametric Method for Capturing Non-Rigid Deformations
We present a novel approach for measuring image similarity based on the composition of parts. The measure identifies common subregions between the images at multiple sizes, and e...
Ady Ecker, Shimon Ullman